Capture the packets on loopback network card on
# tcpdump -i lo -w lo.pcap port 33333 tcpdump: listening on lo, link-type EN10MB (Ethernet), capture size 262144 bytes ......
Download it onto
Windows and use
wireshark to analyze it:
We can see every packet conforms to standard
Capture lookback packets on
# tcpdump -i lo0 -w lo.pcap port 33333 tcpdump: listening on lo0, link-type LOOP ......
Also download it onto
Windows and open it with
wireshark just recognizes the packet as “Raw IP” format, but can’t show details.
I modified the
0x6C, which means “
Now the packets can be decoded successfully:
P.S., I also started a discussion about this issue in mailing list.